Sweetening Your Threat Intelligence with Automated Honeypots
Loading...
Other Version
External File or Record
Can’t use the file because of accessibility barriers? Contact us
Date
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Permanent Link
Abstract
Many organizations currently deploy honeypots within their networks to generate actionable threat intelligence. However, the process of deploying numerous honeypots across a network can require a significant amount of setup and configuration. We will present a method for dynamically and automatically deploying honeypots using Docker and Ansible, as well as deployment techniques for several popular cloud providers. By using these techniques to deploy honeypots, organizations can rapidly and easily enhance their current threat intelligence.
Series and Number:
EducationalLevel:
Is Based On:
Target Name:
Teaches:
Table of Contents
Description
Keywords
Citation
Journal
DOI
Rights
This work may be protected by copyright unless otherwise stated.